Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Gait recognition method based on dilated reparameterization and atrous convolution architecture
Lina HUO, Leren XUE, Yujun DAI, Xinyu ZHAO, Shihang WANG, Wei WANG
Journal of Computer Applications    2025, 45 (4): 1285-1292.   DOI: 10.11772/j.issn.1001-9081.2024050566
Abstract74)   HTML0)    PDF (1928KB)(29)       Save

Gait recognition aims at identifying people by their walking postures. To solve the problem of poor matching between the Effective Receptive Field (ERF) and the human silhouette region, a gait recognition method based on atrous convolution, named DilatedGait, was proposed. Firstly, atrous convolution was employed to expand the neurons’ receptive fields, thereby alleviating the resolution degradation by downsampling and model deepening. Therefore, the recognizability of the silhouette structure was enhanced. Secondly, Dilated Reparameterization Module (DRM) was proposed to optimize the ERF focus range by fusing the multi-scale convolution kernel parameters through reparameterization method, thus enabling the model to capture more global contextual information. Finally, the discriminative gait features were extracted via feature mapping. Experiments were conducted on the outdoor datasets Gait3D and GREW, and the results show that compared with the existing state-of-the-art method GaitBase, DilatedGait improves 9.0 and 14.2 percentage points respectively in Rank-1 and mean Inverse Negative Penalty (mINP) on Gait3D and increases 11.6 and 8.8 percentage points respectively in Rank-1 and Rank-5 on GREW. It can be seen that DilatedGait overcomes the adverse effects of complex covariates and further enhances the accuracy of gait recognition in outdoor scenes.

Table and Figures | Reference | Related Articles | Metrics
Developer recommendation for open-source projects based on collaborative contribution network
Lan YOU, Yuang ZHANG, Yuan LIU, Zhijun CHEN, Wei WANG, Xing ZENG, Zhangwei HE
Journal of Computer Applications    2025, 45 (4): 1213-1222.   DOI: 10.11772/j.issn.1001-9081.2024040454
Abstract36)   HTML0)    PDF (4564KB)(11)       Save

Recommending developers for open-source projects is of great significance to the construction of open-source ecology. Different from traditional software development, developers, projects, organizations and correlations in the open-source field reflect the characteristics of open collaborative projects, and their embedded semantics help to recommend developers accurately for open-source projects. Therefore, a Developer Recommendation method based on Collaborative Contribution Network (DRCCN) was proposed. Firstly, a CCN was constructed by utilizing the contribution relationships among Open-Source Software (OSS) developers, OSS projects and OSS organizations. Then, based on CCN, a three-layer deep heterogeneous GraphSAGE (Graph SAmple and aggreGatE) Graph Neural Network (GNN) model was constructed to predict the links between developer nodes and open-source project nodes, so as to generate the corresponding embedding pairs. Finally, according to the prediction results, the K-Nearest Neighbor (KNN) algorithm was adopted to complete the developer recommendation. The proposed model was trained and tested on GitHub dataset, and the experimental results show that compared to the contrastive learning model for sequential recommendation CL4SRec (Contrastive Learning for Sequential Recommendation), DRCCN improves the precision, recall, and F1 score by approximately 10.7%, 2.6%, and 4.2%, respectively. It can be seen that the proposed model can provide important reference for the developer recommendation of open-source community projects.

Table and Figures | Reference | Related Articles | Metrics
Deep network compression method based on low-rank decomposition and vector quantization
Dongwei WANG, Baichen LIU, Zhi HAN, Yanmei WANG, Yandong TANG
Journal of Computer Applications    2024, 44 (7): 1987-1994.   DOI: 10.11772/j.issn.1001-9081.2023071027
Abstract333)   HTML121)    PDF (1506KB)(467)       Save

As the development of artificial intelligence, deep neural network has become an essential tool in various pattern recognition tasks. Deploying deep Convolutional Neural Networks (CNN) on edge computing equipment is challenging due to storage space and computing resource constraints. Therefore, deep network compression has become an important research topic in recent years. Low-rank decomposition and vector quantization are the most popular network compression techniques, which both try to find a compact representation of the original network, thereby reducing the redundancy of network parameters. By establishing a joint compression framework, a deep network compression method based on low-rank decomposition and vector decomposition — Quantized Tensor Decomposition (QTD) was proposed to obtain higher compression ratio by performing further quantization based on the low-rank structure of network. Experimental results of classical ResNet and the proposed method on CIFAR-10 dataset show that the volume can be compressed to 1% by QTD with a slight accuracy drop of 1.71 percentage points. Moreover, the proposed method was compared with the quantization-based method PQF (Permute, Quantize, and Fine-tune), the low-rank decomposition-based method TDNR (Tucker Decomposition with Nonlinear Response), and the pruning-based method CLIP-Q (Compression Learning by In-parallel Pruning-Quantization) on large dataset ImageNet. Experimental results show that QTD can maintain better classification accuracy with same compression range.

Table and Figures | Reference | Related Articles | Metrics
3D vehicle detection with adaptive horizon line constraints
Wei WANG, Chunhui ZHAO, Xinyao TANG, Liugang XI
Journal of Computer Applications    2024, 44 (3): 909-915.   DOI: 10.11772/j.issn.1001-9081.2023040416
Abstract205)   HTML5)    PDF (3570KB)(149)       Save

The commonly used monocular vision-based vehicle 3D detection method at present combines object detection with geometric constraint. However, the position of the vanishing point in the geometric constraint has a significant impact on the results. To obtain more accurate constraint conditions, a 3D vehicle detection algorithm based on horizon line detection was proposed. First, the relative position of the vanishing point was obtained using the vehicle image, and the vehicle image was preprocessed to an appropriate size. Then, the preprocessed vehicle image was fed into a vanishing point detection network to obtain a set of heatmaps indicating the vanishing point information. The vanishing point information was regressed, and the horizon information was calculated. Finally, geometric constraint was constructed based on the horizon line information, and the initial dimensions of the vehicle were iteratively optimized within the constrained space to calculate the precise 3D information of the vehicle. The experimental results demonstrate that the proposed horizon line solving algorithm obtains more accurate horizon lines. Compared to the random forest method, there is an AUC (Area Under Curve) improvement of 1.730 percentage points. Simultaneously, the introduced horizon line constraint effectively restricts the 3D vehicle information, resulting in an average precision improvement of 2.201 percentage points compared to the algorithm using diagonal and vanishing point constraint. It can be observed that the horizon line serves as a geometric constraint for solving vehicle 3D information in the context of roadside monocular camera perspectives.

Table and Figures | Reference | Related Articles | Metrics
Searchable electronic health record sharing scheme with user revocation
Zheng WANG, Jingwei WANG, Xinchun YIN
Journal of Computer Applications    2024, 44 (2): 504-511.   DOI: 10.11772/j.issn.1001-9081.2023030272
Abstract206)   HTML8)    PDF (1957KB)(97)       Save

With the rapid development and wide application of the Internet of Things (IoT) and cloud storage technology, an increasing number of sensor devices are deployed to the Internet of Medical Things (IoMT) system every year, which promotes the popularization of Electronic Health Record (EHR). However, the secure storage and retrieval of EHRs have not been properly resolved. To address this problem, a searchable attribute-based encryption scheme with a fixed-length trapdoor was constructed for the search and verification of ciphertext, which reduced the communication overhead required by users. By adopting the online/offline encryption technology, the computing overhead on the user side was reduced. Meanwhile, with the help of chameleon hash function, a private key with the characteristics of anti-collision and semantical security was constructed, which avoided the problem of frequent updating of private keys of unrevoked users and greatly reduced the computing overhead of users. Theoretical analysis and experimental results show that the proposed scheme can resist chosen-plaintext attack under the Decisional Bilinear Diffie-Hellman (DBDH) assumption, and compared with other similar attribute based encryption schemes, the proposed scheme is more efficient, which supports online encryption, efficient user revocation, and has lower computational and storage overheads.

Table and Figures | Reference | Related Articles | Metrics
Small target detection method in UAV images based on fusion of dilated convolution and Transformer
Lin WANG, Jingliang LIU, Wuwei WANG
Journal of Computer Applications    2024, 44 (11): 3595-3602.   DOI: 10.11772/j.issn.1001-9081.2023111575
Abstract247)   HTML4)    PDF (1433KB)(122)       Save

A multi-scale dilated convolution based Unmanned Aerial Vehicle (UAV) image target detection algorithm Swin-Det was proposed to address the issues of complex target scenes, diverse scales of targets, dense small targets and severe occlusion of targets in UAV aerial images. Firstly, Swin Transformer was used as the backbone feature extraction network, and a Spatial Information Blending Module (SIBM) was introduced into the backbone network to solve the problem of fuzziness in target information due to occlusion between objects. Secondly, a Fusion of Dilation Feature Pyramid Network (FDFPN) was proposed to fuse feature information through multi-branch dilated convolution, thereby effectively improving the receptive field of the network and the reuse of feature information, so that the model was able to learn detailed features of different dimensions. Finally, the issues of mismatches in the prediction area and sample imbalance were addressed by using linear interpolation method and multi-task loss function, thereby improving the detection precision of the model. Experimental results on VisDrone dataset show that the Swin-Det algorithm reaches a mean Average Precision (mAP) of 27.2%, which is 4.1 percentage points higher than that of the original Swin Transformer, and converges faster under the same training batch. It can be seen tha the Swin-Det algorithm can achieve high-precision detection of UAV image targets in complex scenes.

Table and Figures | Reference | Related Articles | Metrics
Deep shadow defense scheme of federated learning based on generative adversarial network
Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE
Journal of Computer Applications    2024, 44 (1): 223-232.   DOI: 10.11772/j.issn.1001-9081.2023010088
Abstract405)   HTML7)    PDF (4561KB)(179)       Save

Federated Learning (FL) allows users to share and interact with multiple parties without directly uploading the original data, effectively reducing the risk of privacy leaks. However, existing research suggests that the adversary can still reconstruct raw data through shared gradient information. To further protect the privacy of federated learning, a deep shadow defense scheme of federated learning based on Generative Adversarial Network (GAN) was proposed. The original real data distribution features were learned by GAN and replaceable shadow data was generated. Then, the original model trained on real data was replaced by a shadow model trained on shadow data and was not directly accessible to the adversary. Finally, the real gradient was replaced by the shadow gradient generated by the shadow data in the shadow model and was not accessible to the adversary. Experiments were conducted on CIFAR10 and CIFAR100 datasets for comparison of the proposed scheme with the five defense schemes of adding noise, gradient clipping, gradient compression, representation perturbation and local regularization and sparsification. On CIFAR10 dataset, the Mean Square Error (MSE) and the Feature Mean Square Error (FMSE) of the proposed scheme were 1.18-5.34 and 4.46-1.03×107 times, and the Peak Signal-to-Noise Ratio (PSNR) of the proposed scheme was 49.9%-90.8%. On CIFAR100 dataset, the MSE and the FMSE of the proposed scheme were 1.04-1.06 and 5.93-4.24×103 times, and the PSNR of the proposed scheme was 96.0%-97.6%. Compared with the deep shadow defense method, the proposed scheme takes into account the actual attack capability of the adversary and the problems in shadow model training, and designs threat models and shadow model generation algorithms. It performs better in theory analysis and experiment result that of the comparsion schemes, and it can effectively reduce the risk of federated learning privacy leaks while ensuring accuracy.

Table and Figures | Reference | Related Articles | Metrics
Time synchronization method based on precision time protocol in industrial wireless sensor networks
Feiqiao SHAN, Zhaowei WANG, Yue SHEN
Journal of Computer Applications    2023, 43 (7): 2255-2260.   DOI: 10.11772/j.issn.1001-9081.2022060825
Abstract316)   HTML7)    PDF (1545KB)(137)       Save

Concerning the dynamic change of link delay, clock timing interference, and uncertainty of timestamp acquisition caused by complex link environment and temperature fluctuation in Industrial Wireless Sensor Networks (IWSNs), a time synchronization method based on Precision Time Protocol (PTP) in IWSNs was proposed. Firstly, the clock state space model and observation model were constructed by integrating the clock timing interference and asymmetric link delay noise in PTP bidirectional time synchronization process. Secondly, a reverse adaptive Kalman filter algorithm was constructed to remove the noise interference. Thirdly, the rationality of the noise statistical model was evaluated by using the clock state normalized innovation ratio of the reverse estimation and the forward estimation. Finally, the process noise of the clock state was dynamically adjusted after setting the detection threshold, thereby achieving precise estimation of clock parameters. Simulation results show that compared with the classical Kalman filter algorithm and PTP protocol, the proposed algorithm has the clock offset and skew estimation with smaller and more stable error standard deviations under different clock timing precision. The reverse adaptive Kalman filter can effectively solve the problem of Kalman filter divergence caused by reasons such as noise uncertainty, and improve the reliability of time synchronization.

Table and Figures | Reference | Related Articles | Metrics
Guidewire artifact removal method of structure-enhanced IVOCT based on Transformer
Jinwen GUO, Xinghua MA, Gongning LUO, Wei WANG, Yang CAO, Kuanquan WANG
Journal of Computer Applications    2023, 43 (5): 1596-1605.   DOI: 10.11772/j.issn.1001-9081.2022040536
Abstract509)   HTML12)    PDF (4010KB)(251)       Save

Improving the image quality of IntraVascular Optical Coherence Tomography (IVOCT) through guidewire artifact removal can assist physicians in diagnosing cardiovascular diseases more accurately, which reduces the probabilities of misdiagnosis and missed diagnosis. Aiming at the difficulties of complex structure information and a large proportion of artifact areas in IVOCT images, a Structure-Enhanced Transformer Network (SETN) using Generative Adversarial Network (GAN) architecture was proposed for guidewire artifact removal of IVOCT images. Firstly, based on the ORiginal Image (ORI) backbone generation network for extracting texture features, the generator of GAN was combined with RTV (Relative Total Variation) image enhanced generation network in parallel to obtain image structure information. Next, during the artifact area reconstruction of ORI/RTV image, Transformer encoders focusing on the temporal/spatial domain information respectively were introduced to capture the contextual information and the correlation between texture/structure features of IVOCT image sequence. Finally, the structural feature fusion module was used to integrate the structural features of different levels into the decoding stage of the ORI backbone generation network, so that the generator was cooperated with the discriminator for completing the image reconstruction of the guidewire artifact area. Experimental results show that the guidewire artifact removal results of SETN are excellent in both texture and structure reconstruction. Besides, the improvement of IVOCT image quality after guidewire artifact removal is positive for both vulnerable plaque segmentation and lumen contour extraction tasks of IVOCT image.

Table and Figures | Reference | Related Articles | Metrics
Pre-hospital emergency text classification model based on label confusion
Xu ZHANG, Long SHENG, Haifang ZHANG, Feng TIAN, Wei WANG
Journal of Computer Applications    2023, 43 (4): 1050-1055.   DOI: 10.11772/j.issn.1001-9081.2022020317
Abstract298)   HTML15)    PDF (1907KB)(145)    PDF(mobile) (906KB)(5)    Save

Aiming at the problems of a lot of specialized vocabulary, sparse features, and a large degree of label confusion in pre-hospital emergency text, a Label Confusion Model (LCM)-based text classification model was proposed. Firstly, Bidirectional Encoder Representation from Transformers (BERT) was used to obtain dynamic word vectors and fully exploit semantic information of specialized vocabulary. Then, the text representation vector was generated by fusing Bidirectional Long Short-Term Memory (BiLSTM) network, weighted convolution, and attention mechanism to improve the feature extraction capability of the model. Finally, LCM was used to obtain semantic associations between text and labels, and dependencies between labels to solve the problem of a large degree of label confusion. In the experiments conducted on the pre-hospital emergency text and public news text datasets, the F1 scores of the LCM-based text classification model reached 93.46% and 97.08%, respectively, which were 0.95% to 7.01% and 0.38% to 2.00% higher than those of the models such as Text Convolutional Neural Network (TextCNN), BiLSTM, and BiLSTM-Attention, respectively. Experimental results show that the proposed model can obtain the semantic information of specialized vocabulary, extract text features more accurately, and effectively solve the problem of large degree of label confusion. At the same time, the proposed model has a certain generalization ability.

Table and Figures | Reference | Related Articles | Metrics
Key event extraction method from microblog by integrating social influence and temporal distribution
Xujian ZHAO, Chongwei WANG, Junli WANG
Journal of Computer Applications    2022, 42 (9): 2667-2673.   DOI: 10.11772/j.issn.1001-9081.2021071330
Abstract340)   HTML14)    PDF (2009KB)(270)       Save

Aiming at the problem that the existing microblog event extraction methods are based on the content characteristics of events and ignore the relationship between the social attributes and time characteristics of events, so that they cannot identify the key events in the propagation process of microblog hot spots, a key event extraction method from microblog by integrating social influence and temporal distribution was proposed. Firstly, the social influence was modeled to present importance of microblog events. Secondly, the temporal characteristics of microblog events during evolution were considered to capture the differences of events under different temporal distributions. Finally, the key microblog events were extracted under different temporal distributions. Experimental results on real datasets show that the proposed method can effectively extract key events in microblog hot spots. Compared with four methods of random selection, Term Frequency-Inverse Document Frequency (TF-IDF), minimum-weight connected dominating set and degree and clustering coefficient information, the proposed method has the event set integrity index improved by 21%, 18%, 26% and 30% on dataset 1 respectively, and 14%, 2%, 21% and 23% on dataset 2 respectively. The extraction effect of the proposed method is better than those of the traditional methods.

Table and Figures | Reference | Related Articles | Metrics
Semantic extraction of domain-dependent mathematical text
Xiaoyu CHEN, Wei WANG
Journal of Computer Applications    2022, 42 (8): 2386-2393.   DOI: 10.11772/j.issn.1001-9081.2021060924
Abstract274)   HTML9)    PDF (791KB)(57)       Save

Aiming at the problem of insufficient acquisition of document semantic information in the field of science and technology,a set of rule-based methods for extracting semantics from domain-dependent mathematical text were proposed. Firstly, domain concepts were extracted from the text and semantic mapping between mathematical entities and domain concepts were realized. Secondly, through context analysis for mathematical symbols, entity mentions or corresponding text descriptions of mathematical symbols were obtained and the semantics of the symbols were extracted. Finally, the semantic analysis of expressions was completed based on the extracted semantics of mathematical symbols. Taking linear algebra texts as research examples, a semantic tagging dataset was constructed for experiments. Experimental results show that the proposed methods achieve a precision higher than 93% and a recall higher than 91% on semantic extraction of identifiers, linear algebra entities and expressions.

Table and Figures | Reference | Related Articles | Metrics
Pattern mining and reuse method for user behaviors of Android applications
Qun MAO, Weiwei WANG, Feng YOU, Ruilian ZHAO, Zheng LI
Journal of Computer Applications    2022, 42 (7): 2155-2161.   DOI: 10.11772/j.issn.1001-9081.2021040652
Abstract346)   HTML14)    PDF (1206KB)(86)       Save

Software testing is an effective way to ensure the quality of Android applications. Understanding the functions of Android applications is the basis of the Android testing process. It aims to deeply explore the application’s business logic and reveal its functional defects, playing an important role in testing. User behavior patterns can assist testers in understanding an Android application’s functions, thereby improving test efficiency. Based on the idea “similar Android applications share user behavior patterns”, a user behavior pattern mining and reuse method was proposed to reduce the cost of Android application testing and improve the testing efficiency. Specifically, for the Android application under test, the user behavior patterns from a similar Android application were mined. Then, the semantic-based event fuzzy matching strategy was used to search the corresponding events for the application under test, and the Graphical User Interface (GUI) model based optimal path selection strategy was used to generate target event sequences for the application under test, thereby achieving user behavior pattern reuse across similar applications. The experiments were conducted on 32 user behavior patterns of three categories of Android applications. The results show that 87.4% of user behavior patterns can be completely reused on similar Android applications, and the reused user behavior patterns can effectively cover 90.2% of important states in applications under test. Thus, the proposed method provides effective support for the testing of Android applications.

Table and Figures | Reference | Related Articles | Metrics
Materialized view asynchronous incremental maintenance task generation under hybrid transaction/analytical processing for single record
Yangyang SUN, Junping YAO, Xiaojun LI, Shouxiang FAN, Ziwei WANG
Journal of Computer Applications    2022, 42 (12): 3763-3768.   DOI: 10.11772/j.issn.1001-9081.2021101725
Abstract392)   HTML4)    PDF (660KB)(71)       Save

Existing materialized view asynchronous incremental maintenance task generation algorithms under Hybrid Transaction/Analytical Processing (HTAP) are mainly used for multiple records and unable to generate materialized view asynchronous incremental maintenance task under HTAP for single record, which results in the increase of disk IO overhead and the performance degradation of materialized view asynchronous incremental maintenance under HTAP. Therefore, a materialized view asynchronous incremental maintenance task generation method under HTAP for single record was proposed. Firstly, the benefit model of materialized view asynchronous incremental maintenance task generation under HTAP for single record was established. Then, the materialized view asynchronous incremental maintenance task generation under HTAP for single record algorithm was designed on the basis of Q-learning. Experimental results show that materialized view asynchronous incremental maintenance task generation under HTAP for single record is realized by the proposed algorithm, and the proposed algorithm decreases the average IOPS (Input/output Operations Per Second), average CPU utilization (2-core) and average CPU utilization (4-core) at least by 8.49 times, 1.85 percentage points and 0.97 percentage points respectively.

Table and Figures | Reference | Related Articles | Metrics
Research progress of blockchain‑based federated learning
Rui SUN, Chao LI, Wei WANG, Endong TONG, Jian WANG, Jiqiang LIU
Journal of Computer Applications    2022, 42 (11): 3413-3420.   DOI: 10.11772/j.issn.1001-9081.2021111934
Abstract1436)   HTML102)    PDF (1086KB)(1140)       Save

Federated Learning (FL) is a novel privacy?preserving learning paradigm that can keep users' data locally. With the progress of the research on FL, the shortcomings of FL, such as single point of failure and lack of credibility, are gradually gaining attention. In recent years, the blockchain technology originated from Bitcoin has achieved rapid development, which pioneers the construction of decentralized trust and provides a new possibility for the development of FL. The existing research works on blockchain?based FL were reviewed, the frameworks for blockchain?based FL were compared and analyzed. Then, key points of FL solved by the combination of blockchain and FL were discussed. Finally, the application prospects of blockchain?based FL were presented in various fields, such as Internet of Things (IoT), Industrial Internet of Things (IIoT), Internet of Vehicles (IoV) and medical services.

Table and Figures | Reference | Related Articles | Metrics
Discrete manta ray foraging optimization algorithm and its application in spectrum allocation
Dawei WANG, Xinhao LIU, Zhu LI, Bin LU, Aixin GUO, Guoqiang CHAI
Journal of Computer Applications    2022, 42 (1): 215-222.   DOI: 10.11772/j.issn.1001-9081.2021020238
Abstract461)   HTML21)    PDF (671KB)(187)       Save

Aiming at the problem of spectrum allocation based on maximizing network benefit in cognitive radio and the fact that Manta Ray Foraging Optimization (MRFO) algorithm is difficult to solve the problem of spectrum allocation, a Discrete Manta Ray Foraging Optimization (DMRFO) algorithm was proposed.Considering the pro-1 characteristic of spectrum allocation problem in engineering, firstly, MRFO algorithm was discretely binarized based on the Sigmoid Function (SF) discrete method. Secondly, the XOR operator and velocity adjustment factor were used to guide the manta rays to adaptively adjust the position of next time to the optimal solution according to the current velocity. Then, the binary spiral foraging was carried out near the global optimal solution to avoid the algorithm from falling into the local optimum. Finally, the proposed DMRFO algorithm was applied to solve the spectrum allocation problem. Simulation results show that the convergence mean and standard deviation of the network benefit when using DMRFO algorithm to allocate spectrum are 362.60 and 4.14 respectively, which are significantly better than those of Discrete Artificial Bee Colony (DABC) algorithm, Binary Particle Swarm Optimization (BPSO) algorithm and Improved Binary Particle Swarm Optimization (IBPSO) algorithm.

Table and Figures | Reference | Related Articles | Metrics
Storyline extraction method from Weibo news based on graph convolutional network
Xujian ZHAO, Chongwei WANG
Journal of Computer Applications    2021, 41 (11): 3139-3144.   DOI: 10.11772/j.issn.1001-9081.2021030451
Abstract518)   HTML39)    PDF (860KB)(370)       Save

As a key platform for people to acquire and disseminate news events, Weibo hides rich event information. Extracting storylines from Weibo data provides users with an intuitive way to accurately understand event evolution. However, the data sparseness and lack of context make it difficult to extract storylines from Weibo data. Therefore, two consecutive tasks for extracting storylines automatically from Weibo data were introduced: 1) events were modeled by propagation impact of Weibo, and the primary events were extracted; 2) the heterogeneous event graph was built based on the event features, and an Event Graph Convolution Network (E-GCN) model was proposed to improve the learning ability of implicit relations between events, so as to predict story branches of the events and link the events. The proposed method was evaluated from the perspectives of story branch and storyline on real datasets. In story branch generation evaluation, the results show that compared with Bayesian model, Steiner tree and Story forest, the proposed method has the F1 value higher by 28 percentage points, 20 percentage points and 27 percentage points on Dataset1 respectively, and higher by 19 percentage points, 12 percentage points and 22 percentage points on Dataset2 respectively. In storyline extraction evaluation, the results show that compared with Story timeline, Steiner tree and Story forest, the proposed method has the correct edge accuracy higher by 33 percentage points, 23 percentage points and 17 percentage points on Dataset1 respectively, and higher by 12 percentage points, 3 percentage points and 9 percentage points on Dataset2 respectively.

Table and Figures | Reference | Related Articles | Metrics
Coroutine and scripted mechanism for embedded system
ZOU Changwei WANG Lin
Journal of Computer Applications    2014, 34 (5): 1408-1412.   DOI: 10.11772/j.issn.1001-9081.2014.05.1408
Abstract560)      PDF (785KB)(448)       Save

Due to the increase of system complexity arising from the partial substitution of the traditional 51 Micro Controller Unit (MCU) with Cortex M3, a method was proposed for concurrent control on embedded system without operating system.First of all, a script language and its corresponding interpreter for concurrent control were implemented via context-free grammar formally; further an proposition was pointed out that multithreading was a sufficient but not necessary condition for concurrent scripts; meanwhile, a coroutine mechanism for concurrent programming on embedded system was constructed by switching script contexts in the interrupt service routine of MCU timer. The experimental results show that the proposed mechanism avoids the dependency on commercial multithreading libraries, which is helpful to decrease the cost of product, promotes the readability of source code and causes a flash programming frequency drop by about 58%.The respective applications on systems with and without operating system demonstrate that this mechanism is portable and practical.

Reference | Related Articles | Metrics
P2P traffic identification method based on K-means and twin support vector machine
GUO Wei WANG Xichuang XIAO Zhenjiu
Journal of Computer Applications    2013, 33 (10): 2734-2738.  
Abstract871)      PDF (775KB)(762)       Save
Most of the P2P traffic identification methods have the problem of high time cost. Therefore, it was proposed to use TWin Support Vector Machine (TWSVM) whose time cost was a quarter of the common Support Vector Machine (SVM) to build classifier. Kmeans ensemble was used to create labeled sample set and labeled sample set was combined as the training sample of the TWSVM. At last, the constructed classification model was used to identify P2P traffic. The experimental results show that the method based on Kmeans and TWSVM can significantly decrease time cost of the P2P traffic identification, and has a higher accuracy rate and better stability than the standard SVM.
Related Articles | Metrics
Feather quill crease recognition based on local Radon transform
YUE Hongwei WANG Renhuang ZHANG Jinghua
Journal of Computer Applications    2013, 33 (05): 1443-1445.   DOI: 10.3724/SP.J.1087.2013.01443
Abstract807)      PDF (431KB)(561)       Save
Concerning the recognition of feather quill crease feature, a new feature extraction method was proposed. In order to solve the scaling and translation sensitivity of Radon transform, an improved Radon transform was used to extract moment invariants of target region and local projection technology was adopted to eliminate interference physiological texture of feather quill. Obtaining invariants matrix by changing the scale factor, Singular Value Decomposition (SVD) was provided here to obtain feature invariant for classification and recognition. The results show that this suggested method has higher robustness and higher recognition rate compared with other algorithms.
Reference | Related Articles | Metrics
Graph-based parallel distributed genetic programming model
LU Qiang ZHONG Wei WANG Zhiguang
Journal of Computer Applications    2013, 33 (05): 1260-1266.   DOI: 10.3724/SP.J.1087.2013.01260
Abstract620)      PDF (1093KB)(738)       Save
Since Genetic Programming (GP) is of natural parallelism, the parallel and distributed GP model was developed, including master-slave model, island model and grid model. However, the realizing algorithm of these distributed models is complex and they cannot be reused. It is difficult to achieve the scale computation of GP quickly based on different topologies. Due to these shortcomings, the authors presented the graph-based parallel distributed GP model which realizes formal description of the various operations of GP, and could support the distributed parallel computation of GP for different topologies. It is easy to achieve the master-slave model, island model and grid model of GP through experimental test. The new model is stable, efficient and easy to realize.
Reference | Related Articles | Metrics
Network cognitive model based on fuzzy comprehensive evaluation
WANG Wei WANG Hui ZHANG Xiao
Journal of Computer Applications    2012, 32 (12): 3486-3489.   DOI: 10.3724/SP.J.1087.2012.03486
Abstract821)      PDF (623KB)(632)       Save
In view of the limitation of the traditional Transmission Control Protocol (TCP) used in the heterogeneous network, a network cognitive model based on fuzzy comprehensive evaluation was proposed. This model, by building the membership functions and different dynamic weight distribution under the different network environment, distinguished the wireless error loss from congestion loss according to fuzzy comprehensive evaluation. The simulation results show: compared with the traditional TCP, under different network conditions, the model can more accurately distinguish the wireless error loss from congestion loss, and improve the TCP throughput and network performance.
Related Articles | Metrics
Application of NSGA-Ⅱalgorithm to emergency task of space service
Jing-Hua TONG DAI Guang-ming ZHU Huai-jun WU Wei WANG Lei-lei
Journal of Computer Applications    2012, 32 (11): 3254-3258.   DOI: 10.3724/SP.J.1087.2012.03254
Abstract907)      PDF (743KB)(401)       Save
This paper gave a solution to emergency task in space. When the emergency task occurred, at first, the existing satellite constellation was used to cover the target locations and the coverage rate was computed. If the coverage performance did not meet the mission requirements, the Non-Dominated Sorting Genetic Algorithm Ⅱ (NSGA-Ⅱ) was used to optimize the layout of satellite constellation, i.e. optimizing the anomaly of each satellite in the constellation. Then the phase modulation maneuver was used to achieve constellation optimization results, i.e. maneuvering the satellites to the specified locations, and calculating maneuver time and energy of each satellite. Finally, an emergency task example and its solution process were provided, and the time and energy of the satellite orbit maneuver were calculated.
Reference | Related Articles | Metrics
Automatic extraction of feather quill based on Normalized cut algorithm
YUE Hong-wei WANG Ren-huang HE Zui-hong
Journal of Computer Applications    2012, 32 (07): 1899-1901.   DOI: 10.3724/SP.J.1087.2012.01899
Abstract1093)      PDF (431KB)(722)       Save
A modified Normalized cut (Ncut) method considering the texture weight was proposed to effectively segment feather quill. The weight including texture information enhanced association on each edge of similar texture and reduced interference of the similar region. Narrow unidirectional expansion method with a region-scalable fitting term was used to optimize the initial boundary for the final result and eliminated boundary leakage of the feather quill. The experimental results show that the proposed method can realize boundary extraction of feather quill efficiently and pave the way for the next step research of crease detection.
Reference | Related Articles | Metrics
Superpixel-based conditional random field for image classification
ZHANG Wei WANG Xi-li
Journal of Computer Applications    2012, 32 (05): 1272-1275.  
Abstract2171)      PDF (2908KB)(1247)       Save
Concerning the high time complexity of inference and parameter estimation in graph model,the concept of superpixel was introduced into the Conditional Random Field (CRF),and a superpixel-based CRF image classification method was proposed. This method first over segmented the image into small homogeneous regions which were called superpixels by using mean shift method. Then the graphical model was constructed with superpixels as nodes and the neighboring nodes as edges. The corresponding definition of CRF and the methods for parameter estimation and labeling inference were proposed and implemented. The experimental results show that better classification results are obtained by the superpixel-based CRF model. At the same time, running time is largely reduced.
Reference | Related Articles | Metrics
Similarity measurement of time-series data with different granularities
SHAO Xiao-shasha HAO Wen-ning JIN Da-wei WANG Ying
Journal of Computer Applications    2011, 31 (12): 3285-3287.  
Abstract1155)      PDF (498KB)(651)       Save
Most of the existing similarity measurement, based on Euclidean distance, cannot be applied directly and effectively to similarity matching of the timeseries with different granularities. This paper proposed a new similarity measure based on the sample of the corresponding D-value. It firstly expounded the definition of the time-series with different granularities, and defined the sample of the corresponding D-value; secondly it put forward the similarity matching algorithm; finally, the experimental results prove that the algorithm can effectively measure the similarity of time-series with multiple granularities.
Related Articles | Metrics
Ground-based GPS water vapor tomography based on algebraic reconstruction technique
WANG Wei WANG Jie-xian
Journal of Computer Applications    2011, 31 (11): 3149-3151.   DOI: 10.3724/SP.J.1087.2011.03149
Abstract1104)      PDF (574KB)(471)       Save
The algebraic reconstruction technique family, including Algebraic Reconstruction Techniques (ART), Multiplicative Algebraic Reconstruction Techniques (MART), Simultaneous Iterative Reconstruction Techniques (SIRT), was studied to reconstruct the three-dimensional distribution of water vapor in this article. The simulation experiment was carried out on Shanghai GPS network. The results show that the algebraic reconstruction technology family can work effectively in water vapor tomography, get rapid convergence, and implement more easily. The range of relaxation factor and the initial value of iteration were also given in the article.
Related Articles | Metrics
Motion planning framework for virtual human arm manipulation
Wei WANG Yan LI
Journal of Computer Applications   
Abstract1424)      PDF (742KB)(966)       Save
A motion planning framework for virtual human arm manipulation was proposed based on bidirectional heuristic Rapidly-exploring Random Tree (RRT). According to whether a manipulated object was hold by hand, the framework proceeded in two phases: a reaching phase and a moving phase. Forward as well as inverse kinematic algorithm was used in these two phases respectively in order to make planning result rapid and credible. The effectiveness of our method was demonstrated by experiments.
Related Articles | Metrics
ABC supporting QoS unicast routing scheme with particle swarm optimization
Xing-Wei WANG
Journal of Computer Applications   
Abstract1890)      PDF (705KB)(912)       Save
A QoS unicast routing scheme with ABC supported was proposed. The interval was used to describe the uncertain users' QoS requirement and inaccurate edge (link) parameter. With the user satisfaction degree, edge evaluation and elitist solution set introduced, a QoS unicast path was searched by particle swarm optimization algorithm and gaming analysis, achieving or approaching Pareto optimal solution under Nash equilibrium on both the network provider utility and the user utility along the found path. Simulation results show that the proposed scheme is both feasible and effective.
Related Articles | Metrics
Multi-access control and multi-format document organizing and retrieving system based on Oracle
Zhi-Hui XIONG De-Xin WANG Wei WANG Mao-Jun ZHANG
Journal of Computer Applications   
Abstract1462)      PDF (579KB)(1055)       Save
Fast retrieval and fine granularity access control of massive inhomogeneous documents are key points of document management system towards industry applications. A classification document organizing and retrieval system on B/S mode was designed in this paper. It achieves fast retrieval and role-based multi-level access control of each document.
Related Articles | Metrics